Security

SECURITY SERVICES

Cyber threats are rapidly increasing with more and more companies falling victim to attacks each year. Gone are the days where your average virus was created by an adolescent coder in their bedroom. Trained and paid professionals exist to create virus’, malware and attack companies.

Luckily, J-Media is here to help and below are just a few examples of ways we can help implement improved security across your business:

ENCRYPTION

Not many people know but encrypting your staff’s hard drives is relatively straight forward. Windows has a built in feature in its more modern operating systems called BitLocker. We regularly enable this feature for clients as part of their New User Process. Resulting in all hardware purchases via J-Media having encryption enables from day 1.

LOST & STOLEN DEVICES

For those with laptops and work mobile devices, a serious security breach can easily be achieved simply by leaving it on the train, hotel or if stolen.

By enabling scripting capabilities on our Advanced Monitoring & Diagnostics software we use to deliver the Managed IT Service we can keep your company secure in these situations, by remotely wiping company data from any lost or reported stolen devices.

What’s more, if the device in question is connected to another network, J-Media will trace the IP Address and report it, so you may forward onto authorities. Helping them to locate the device.

SINGLE SIGN ON

Single Sign On (SSO) is an authentication process that allows users to access multiple applications and systems with one set of login credentials. This process is integrated with your Active Directory therefore making it easier to audit where and how the credentials are used. If a user’s credentials are compromised, our auditing tools are able to determine not only which accounts were breached, but also what was done during the breach and where it took place. Creating an effective audit trial.

MULTI-FACTOR AUTHENTICATION

Multi-Factor Authentication is an increased layer of security on computer access. A user is only granted access to their machines after successfully presenting/ answering several individual pieces of evidence to authenticate themselves.

Example: Dave has a work mobile and laptop. He tries to log into his laptop. He is asked to answer a personal question as his first piece of evidence and as we know his direct work mobile number, a PIN is sent via text. This is the second piece of evidence the mechanism requires to confirm that it is Dave logging on.

Multi-Factor Authentication is an extremely beneficial service and one which adds immediate security benefits.

DATA LOSS PREVETION

By preventing users from sending sensitive or critical information outside the corporate network we are preventing accidental & premeditated data loss. This can be as simple as preventing certain files being emailed outside of the network, to preventing documents from being put onto USB devices.

There are many DLP packages available on the market and it isn’t easy deciding which is best for your needs.

Before purchasing any DLP software, we strongly advise you speak with your dedicated IT Manager first or consult with one of our Engineers.

What our customers say

As Microsoft Gold Partners, we knew straight away they were professionals.